introduction to engineering and profession ethics lecture9-computer ethics, privacy and...

35
Lecture 9 Dr. Khaled Bakro Computer Ethics, Privacy and Security Introduction to Engineering and Profession Ethics

Upload: dr-khaled-bakro

Post on 21-Mar-2017

18 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Lecture 9

Dr. Khaled Bakro

Computer Ethics, Privacy and Security

Introduction to Engineering and Profession Ethics

Page 2: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Computer Ethics

Computers are involved to some extent in almost every aspect of our lives They often perform life-critical tasks

Computer science is not regulated to the extent of medicine, air travel, or construction zoning

Therefore, we need to carefully consider the issues of ethics

Page 3: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Ethics

Ethics are standards of moral conduct Standards of right and wrong

behavior A gauge of personal integrity The basis of trust and cooperation

in relationships with others

Page 4: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Ethical Principals

Ethical principals are tools which are used to think through difficult situations.

Three useful ethical principals: An act is ethical if all of society benefits

from the act. An act is ethical if people are treated as

an end and not as a means to an end. An act is ethical if it is fair to all parties

involved.

Page 5: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Computer Ethics

Computer ethics are morally acceptable use of computers i.e. using computers appropriately

Standards or guidelines are important in this industry, because technology changes are outstripping the legal system’s ability to keep up

Page 6: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Computer Ethics Special Responsibilities Facing Computer

Professionals and Users Maintaining relationships with and

responsibilities toward customers, clients, coworkers, employees, and employers.

Making critical decisions that have significant consequences for many people.

Determining how to manage, select, or use computers in a professional setting

Page 7: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Ethics for Computer Professionals

Computer Professionals: Are experts in their field, Know customers rely on their knowledge,

expertise, and honesty, Understand their products (and related risks)

affect many people, Follow good professional standards and

practices, Maintain an expected level of competence and

are up-to-date on current knowledge and technology, and

Educate the non-computer professional

Page 8: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Computer Ethics

Four primary issues Privacy – responsibility to protect data about

individuals Accuracy - responsibility of data collectors to

authenticate information and ensure its accuracy

Property - who owns information and software and how can they be sold and exchanged

Access - responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used

Page 9: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Problems with Large Databases

Spreading information without consent Some large companies use medical records

and credit records as a factor in important personnel decisions

Spreading inaccurate information Mistakes in one computer file can easily

migrate to others Inaccurate data may linger for years

Page 10: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

U.S. Federal Privacy LawsGeneral Federal Privacy Laws: Freedom Of Information Act, 1968 Privacy Act Of 1974 Electronic Communications Privacy Act Of

1986 Computer Matching And Privacy Protection

Act Of 1988 Computer Security Act Of 1987 Federal Internet Privacy Protection Act Of

1997

Page 11: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Privacy Laws Affecting Private Institutions: Fair Credit Reporting Act, 1970 Right To Financial Privacy Act Of 1978 Privacy Protection Act Of 1980 Cable Communications Policy Act Of 1984 Electronic Communications Privacy Act Of 1986 Video Privacy Protection Act Of 1988 Consumer Internet Privacy Protection Act Of 1997 Communications Privacy & Consumer Empowerment Act

Of 1997 Data Privacy Act Of 1997

U.S. Federal Privacy Laws

Page 12: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Private Networks

Employers may legally monitor electronic mail In 2001, 63% of companies monitored

employee Internet connections including about two-thirds of the 60 billion electronic messages sent by 40 million e-mail users.

Most online services reserve the right to censor content

These rights lead to contentious issues over property rights versus free speech and privacy

Page 13: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

The Internet and the Web

Most people don’t worry about email privacy on the Web due to illusion of anonymity Each e-mail you send results in at least 3 or 4

copies being stored on different computers. Web sites often load files on your computer

called cookies to record times and pages visited and other personal information

Spyware - software that tracks your online movements, mines the information stored on your computer, or uses your computer for some task you know nothing about.

Page 14: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

General Internet Issues

Inflammatory interchange of messages via internet (email, chat rooms, etc.)

Chain mail Virus warning hoaxes “Spam” – unsolicited, bulk email

Page 15: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

E-Mail Netiquette

Promptly respond to messages. Delete messages after you read them if you

don’t need to save the information. Don’t send messages you wouldn’t want

others to read. Keep the message short and to the point. Don’t type in all capital letters. Be careful with sarcasm and humor in your

message.

Page 16: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Internet Content & Free Speech Issues

Information on internet includes hate, violence, and information that is harmful for children How much of this should be regulated? Do filters solve problems or create more?

Is web site information used for course work and research reliable?

Page 17: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Information OwnershipIssues

Illegal software copying (pirating) Infringement of copyrights by copying of

pictures or text from web pages Plagiarism by copying text from other

sources when original work is expected

Page 18: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Terms

INTELLECTUAL PROPERTY: Intangible creations protected by law

TRADE SECRET: Intellectual work or products belonging to a business, not in public domain

COPYRIGHT: Statutory grant protecting intellectual property from copying by others for 28 years

PATENT: Legal document granting owner exclusive monopoly on an invention for 17 years

Page 19: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Copyright Laws

Software developers (or the companies they work for) own their programs.

Software buyers only own the right to use the software according to the license agreement.

No copying, reselling, lending, renting, leasing, or distributing is legal without the software owner’s permission.

Page 20: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Software Licenses

There are four types of software licenses: Public Domain Freeware Shareware All Rights Reserved

Page 21: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Public Domain License

Public domain software has no owner and is not protected by copyright law.

It was either created with public funds, or the ownership was forfeited by the creator.

Can be copied, sold, and/or modified Often is of poor quality/unreliable

Page 22: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Freeware License

Freeware is copyrighted software that is licensed to be copied and distributed without charge.

Freeware is free, but it’s still under the owner’s control.

Examples: Eudora Light Netscape

Page 23: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Shareware License

A shareware software license allows you to use the software for a trial period, but you must pay a registration fee to the owner for permanent use. Some shareware trials expire on a certain

date Payment depends on the honor system

Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation.

Page 24: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

All Rights Reserved License

May be used by the purchaser according the exact details spelled out in the license agreement.

You can’t legally use it--or even possess it-- without the owner’s permission.

Page 25: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Software Piracy

SPA (Software Publishers Association) polices software piracy and mainly targets:

Illegal duplication Sale of copyrighted software Companies that purchase single copies

and load the software on multiple computers or networks They rely on whistle-blowers. Penalties (for primary user of PC) may include fines up to $250,000 and/or imprisonment up to 5 years in jail

Page 26: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

System Quality

Bug-free software is difficult to produce It must be carefully designed, developed,

and tested Mistakes generated by computers can be

far reaching Commenting and documenting software is

required for effective maintenance throughout the life of the program

Page 27: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Software PiracyUnethical, or “Just” Illegal?

2/3 of college students report that they do, or would, download pirated software

93% claim to endorse IP rights and legitimate software development

Does this make sense?

What role will IP play in your career?

Page 28: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

System Quality

ETHICAL ISSUES: When is software, system or service ready for release?

SOCIAL ISSUES: Can people trust quality of software, systems, services, data?

POLITICAL ISSUES: Should congress or industry develop standards for software, hardware, data quality?

Page 29: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Computer Crime

Computer criminals -using a computer to commit an illegal act

Who are computer criminals? Employees – disgruntled or dishonest --the

largest category Outside users - customers or suppliers “Hackers” and “crackers” - hackers do it

“for fun” but crackers have malicious intent Organized crime - tracking illegal

enterprises, forgery, counterfeiting

Page 30: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Types of Computer Crime

Damage to computers, programs or files Viruses - migrate through systems attached to

files and programs Worms - continuously self-replicate

Theft Of hardware, software, data, computer time Software piracy - unauthorized copies of

copyrighted material View/Manipulation

“Unauthorized entry” and “harmless message” still illegal

Page 31: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Computer security involves protecting: information, hardware and software from unauthorized use and damage and from sabotage and natural disasters

Computer Security

Page 32: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Restricting access both to the hardware locations (physical access) and into the system itself (over the network) using firewalls

Implementing a plan to prevent break-ins Changing passwords frequently Making backup copies Using anti-virus software Encrypting data to frustrate interception Anticipating disasters (disaster recovery plan) Hiring trustworthy employees

Measures to Protect Computer Security

Page 33: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Computer Ethics for Computer Professionals

Competence– Professionals keep up with the latest knowledge in their field and perform services only in their area of competence.

Responsibility– Professionals are loyal to their clients or employees, and they won’t disclose confidential information.

Integrity– Professionals express their opinions based on facts, and they are impartial in their judgments.

Page 34: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

The ACM Code of Conduct

According to the Association for Computing Machinery (ACM) code, a computing professional: Contributes to society and human well-being Avoids harm to others Is honest and trustworthy Is fair and takes action not to discriminate Honors property rights, including copyrights

and patents Gives proper credit when using the intellectual

property of others Respects other individuals’ rights to privacy Honors confidentiality

Page 35: Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, Privacy and Security-Dr.Khaled Bakro د. خالد بكرو

Quality of Life Issues

Rapid Change: Reduced response time to competition

Maintaining Boundaries: Family, work, leisure

Dependence And Vulnerability Employment:

Re-engineering job loss Equity & Access:

Increasing gap between haves and have nots Health Issues